The ground state proton, neutron and matter densities and
corresponding root mean square radii of unstable proton-rich 17Ne
and 27P exotic nuclei are studied via the framework of the twofrequency
shell model. The single particle harmonic oscillator wave
functions are used in this model with two different oscillator size
parameters core b and halo , b the former for the core (inner) orbits
whereas the latter for the halo (outer) orbits. Shell model calculations
for core nucleons and for outer (halo) nucleons in exotic nuclei are
performed individually via the computer code OXBASH. Halo
structure of 17Ne and 27P nuclei is confirmed. It is found that the
structure of 17Ne and 27P nuclei have 2
5 / 2 (1d ) and 1/ 2 2s -dominant
configurations, respectively. Elastic electron scattering form factors
of these exotic nuclei are also studied using the plane wave Born
approximation. Effects of the long tail behavior of the proton density
distribution on the proton form factors of 17Ne and 27P are
analyzed. It is found that the difference between the proton form
factor of 17Ne and that of stable 20Ne (or of 27P and that of stable
31P) comes from the difference in the proton density distribution of
the last two protons (or of the last proton) in the two nuclei. It is
concluded that elastic electron scattering will be an efficient tool (in
the near future) to examine proton-halo phenomena of proton-rich
nuclei.
This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,
The research discusses the issue of attribution to the verb, because the Arab scholars are unanimous in preventing attribution of the verb, because it is always informed of it, and does not inform about it, but this consensus violates the linguistic use. The research discusses this matter.
The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation simila
... Show MoreAbstract: The aim of the current research is to identify (the relationship between deep understanding skills and mathematical modeling among fifth grade students) the research sample consisted of (411) male and female students of the fifth grade of biology distributed over the General Directorates of Education in Baghdad / Al-Rusafa / 2 / and Al-Karkh / 1 /, and two research tools were built: 1- A test of deep understanding skills, consisting of (20) test items and a scale for two skills. 2- The second test consists of (24) test items distributed among (18) essay items and (6) objective items. The psychometric properties of validity, stability, discriminatory strength, and effectiveness of alternatives were verified for the two tests fo
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More